General

  • Target

    ovRDe2RyH2kWS1u.exe

  • Size

    771KB

  • Sample

    220224-rbh29aedcj

  • MD5

    87ee91152f7a07f16db9756feae2fb0a

  • SHA1

    0a3221619d69958e52f8b8719260196aa130ebcc

  • SHA256

    a70a717458c5147a02dca62c03c58d2e11e165180e683fa4755c719e6f9ad9c5

  • SHA512

    a385d5b89051a17c6cae76f985aea9f339423a2e6467cf460be495eda78f2791d7a02cfba30ab114a4be506b7aac754737657cd4537efb066723787385bb464a

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wdc8

Decoy

mygotomaid.com

joyoushealthandwellnessspa.com

wefundprojects.com

magicbasketbourse.net

vitos3.xyz

oligopoly.city

beauty-bihada.asia

visitnewrichmond.com

crgeniusworld.biz

bantasis.com

transsexual.pro

casagraph.com

eastjamrecords.com

howtotrainyourmustache.com

heiappropriate.xyz

bataperu.com

ces341.com

prajahitha.com

manuelagattegger.com

wolfpackmotorcycletours.com

Targets

    • Target

      ovRDe2RyH2kWS1u.exe

    • Size

      771KB

    • MD5

      87ee91152f7a07f16db9756feae2fb0a

    • SHA1

      0a3221619d69958e52f8b8719260196aa130ebcc

    • SHA256

      a70a717458c5147a02dca62c03c58d2e11e165180e683fa4755c719e6f9ad9c5

    • SHA512

      a385d5b89051a17c6cae76f985aea9f339423a2e6467cf460be495eda78f2791d7a02cfba30ab114a4be506b7aac754737657cd4537efb066723787385bb464a

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks